Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Apache Struts 2 DoS Vulnerability Let Attackers Crash Server

Posted on December 12, 2025December 12, 2025 By CWS

A crucial denial-of-service vulnerability has been found in Apache Struts 2, affecting a number of variations of the favored net utility framework.

The vulnerability, recognized as CVE-2025-64775, exploits a file leak in multipart request processing that may trigger disk exhaustion and server crashes.

Organizations working affected variations ought to prioritize patching instantly to stop potential service disruptions. The flaw exists in Apache Struts 2’s file add performance when enabled.

AttributeDetailsCVE IDCVE-2025-64775ImpactDenial-of-ServiceSeverityImportantFixed VersionsStruts 6.8.0+, Struts 7.1.1+Patch StatusBackward Appropriate

A file leak in multipart request processing causes disk exhaustion by permitting attackers to fill storage capability with out correct cleanup or useful resource administration.

This ends in a whole denial of service because the server turns into unable to course of legit requests when disk area is exhausted.

Safety researcher Nicolas Fournier found the vulnerability. This advisory is crucial for all Apache Struts 2 builders, system directors, and organizations deploying Struts-based purposes.

Any group with file add capabilities enabled ought to instantly assess its atmosphere and apply needed patches.

A number of variations throughout 4 main launch strains are impacted.

VersionsStatusRecommendationStruts 2.0.0 – 2.3.37EOL & VulnerableUpgrade immediatelyStruts 2.5.0 – 2.5.33EOL & VulnerableUpgrade immediatelyStruts 6.0.0 – 6.7.4VulnerableUpdate requiredStruts 7.0.0 – 7.0.3VulnerableUpdate required6.8.0+ or 7.1.1+SafeUse minimal really useful variations

Struts 2.0.0 by way of 2.3.37 are affected, although this model line reached end-of-life. Struts 2.5.0 by way of 2.5.33 are additionally susceptible however equally reached end-of-life standing.

Extra critically, Struts 6.0.0 by way of 6.7.4 and Struts 7.0.0 by way of 7.0.3 stay actively maintained and require rapid updates. Organizations ought to improve to Struts 6.8.0 or Struts 7.1.1 at a minimal.

The patches are backward suitable, guaranteeing easy transitions with out breaking present performance.

These unable to improve instantly can implement workarounds by configuring devoted short-term folders with restricted storage or by turning off file add help if it’s not required for operations.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Apache, Attackers, Crash, DoS, Server, Struts, Vulnerability

Post navigation

Previous Post: New React RSC Vulnerabilities Enable DoS and Source Code Exposure
Next Post: Ashen Lepus Hacker Group Attacks Eastern Diplomatic Entities With New AshTag Malware

Related Posts

Serial Hacker Jailed for Hacking and Defacing Organizations’ Websites Cyber Security News
What is ClickFix Attack – How Hackers are Using it to Attack User Device With Malware Cyber Security News
AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk Cyber Security News
20-Year-Old Vulnerability Allows Hackers to Control Train Brakes Cyber Security News
Cloudflare Discloses Technical Details Behind Massive Outage that Breaks the Internet Cyber Security News
EV Charging Provider Confirm Data Breach Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Bug Bounty Program Expanded to Third-Party Code
  • New BlackForce Phishing Kit Lets Attackers Steal Credentials Using MitB Attacks and Bypass MFA
  • Policy, Isolation, and Data Controls That Actually Work
  • Ashen Lepus Hacker Group Attacks Eastern Diplomatic Entities With New AshTag Malware
  • Apache Struts 2 DoS Vulnerability Let Attackers Crash Server

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Bug Bounty Program Expanded to Third-Party Code
  • New BlackForce Phishing Kit Lets Attackers Steal Credentials Using MitB Attacks and Bypass MFA
  • Policy, Isolation, and Data Controls That Actually Work
  • Ashen Lepus Hacker Group Attacks Eastern Diplomatic Entities With New AshTag Malware
  • Apache Struts 2 DoS Vulnerability Let Attackers Crash Server

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark